Compare Check Point Harmony Email & Collaboration and Netwrix Endpoint Protector

At a Glance
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Star Rating
(513)4.6 out of 5
Market Segments
Mid-Market (59.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony Email & Collaboration
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Star Rating
(160)4.5 out of 5
Market Segments
Mid-Market (54.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Netwrix Endpoint Protector
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony Email & Collaboration excels in providing seamless integration with platforms like Microsoft 365, enhancing security without disrupting productivity. Users appreciate the real-time threat prevention and clear reporting features that bolster confidence in protecting sensitive information.
  • Users say that Netwrix Endpoint Protector offers an easy-to-implement data loss prevention solution, particularly highlighting its minimal need for third-party server support. This simplicity in setup is a significant advantage for organizations looking to secure their endpoint assets efficiently.
  • Reviewers mention that Check Point Harmony Email & Collaboration effectively catches phishing attempts and unwanted spam, which significantly reduces IT workload. The intuitive dashboard provides clear visibility, making policy management straightforward and saving time for IT teams.
  • According to verified reviews, Netwrix Endpoint Protector is praised for its support across multiple operating systems, including Windows, Linux, and macOS. Users have found the installation process on cloud servers to be particularly smooth, which is beneficial for organizations utilizing diverse environments.
  • G2 reviewers highlight that Check Point Harmony Email & Collaboration has a strong focus on compliance and data leak prevention, which is crucial for businesses handling sensitive data. Users appreciate the API Inline protection that enhances security across all SaaS applications.
  • Users report that while Netwrix Endpoint Protector is effective for basic functionalities like USB enable/disable, they are eager to explore its more advanced DLP features. This indicates a potential area for growth, as users look to leverage the full capabilities of the product in the future.
Pricing
Entry-Level Pricing
Check Point Harmony Email & Collaboration
No pricing available
Netwrix Endpoint Protector
No pricing available
Free Trial
Check Point Harmony Email & Collaboration
No trial information available
Netwrix Endpoint Protector
Free Trial is available
Ratings
Meets Requirements
9.2
344
9.1
115
Ease of Use
9.1
353
9.1
117
Ease of Setup
9.2
288
9.0
111
Ease of Admin
9.3
257
9.0
104
Quality of Support
9.1
336
9.2
119
Has the product been a good partner in doing business?
9.3
251
9.2
105
Product Direction (% positive)
9.7
327
9.1
111
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.2
71
8.9
113
Administration
9.1
62
9.0
91
9.2
61
8.9
92
9.4
62
8.5
95
Governance
9.0
51
Feature Not Available
9.2
55
9.2
91
9.1
55
9.1
93
Security
9.3
53
Feature Not Available
9.1
53
Feature Not Available
9.3
58
Feature Not Available
9.2
54
Feature Not Available
9.0
196
Not enough data
Administration
9.0
157
Not enough data
9.1
161
Not enough data
9.0
149
Not enough data
8.8
126
Not enough data
Maintenance
9.0
152
Not enough data
9.2
164
Not enough data
9.0
141
Not enough data
8.6
118
Not enough data
Security
9.2
166
Not enough data
8.8
117
Not enough data
9.3
162
Not enough data
9.2
156
Not enough data
9.4
162
Not enough data
9.0
133
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
8.6
52
Not enough data
Analysis
8.9
35
Not enough data
8.7
34
Not enough data
8.8
37
Not enough data
Functionality
8.3
28
Not enough data
8.9
30
Not enough data
8.6
27
Not enough data
Security
8.7
37
Not enough data
8.1
36
Not enough data
8.8
32
Not enough data
8.7
35
Not enough data
8.9
59
Not enough data
Data Protection
9.1
48
Not enough data
9.1
52
Not enough data
9.0
53
Not enough data
9.2
53
Not enough data
9.0
50
Not enough data
Analysis
8.8
48
Not enough data
8.8
48
Not enough data
9.0
51
Not enough data
Administration
8.8
52
Not enough data
9.0
52
Not enough data
8.8
50
Not enough data
9.0
98
Not enough data
Security
9.0
70
Not enough data
9.1
84
Not enough data
9.0
79
Not enough data
9.2
82
Not enough data
Administration
9.1
87
Not enough data
8.7
75
Not enough data
9.0
78
Not enough data
Access Control
9.2
82
Not enough data
9.2
79
Not enough data
9.0
79
Not enough data
9.0
76
Not enough data
Intelligent Email ProtectionHide 12 FeaturesShow 12 Features
9.3
119
Not enough data
Administration
9.3
91
Not enough data
9.1
104
Not enough data
9.4
102
Not enough data
9.2
98
Not enough data
Detection
9.0
93
Not enough data
9.3
101
Not enough data
9.3
103
Not enough data
Protection
9.4
98
Not enough data
9.2
96
Not enough data
9.3
104
Not enough data
Agentic AI - Intelligent Email Protection
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
8.7
18
Not enough data
Encryption Techniques - Email Encryption
8.8
17
Not enough data
8.6
17
Not enough data
9.0
17
Not enough data
Authentication, Verification, and Access Controls - Email Encryption
8.7
17
Not enough data
8.8
16
Not enough data
8.6
16
Not enough data
8.9
17
Not enough data
Security Enhancements and Auditing - Email Encryption
8.9
17
Not enough data
8.8
16
Not enough data
9.2
16
Not enough data
8.3
16
Not enough data
Integration, Compatibility, and Usability - Email Encryption
8.8
16
Not enough data
8.1
15
Not enough data
8.9
15
Not enough data
8.5
17
Not enough data
7.5
12
Not enough data
Agentic AI - Email Anti-spam Features
7.7
11
Not enough data
7.3
11
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Check Point Harmony Email & Collaboration and Netwrix Endpoint Protector are categorized as Data Loss Prevention (DLP)
Unique Categories
Netwrix Endpoint Protector
Netwrix Endpoint Protector is categorized as Endpoint Management
Reviews
Reviewers' Company Size
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Small-Business(50 or fewer emp.)
16.4%
Mid-Market(51-1000 emp.)
59.0%
Enterprise(> 1000 emp.)
24.6%
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Small-Business(50 or fewer emp.)
20.9%
Mid-Market(51-1000 emp.)
54.7%
Enterprise(> 1000 emp.)
24.3%
Reviewers' Industry
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Information Technology and Services
17.1%
Computer & Network Security
9.3%
Financial Services
7.6%
Computer Software
3.9%
Higher Education
2.6%
Other
59.6%
Netwrix Endpoint Protector
Netwrix Endpoint Protector
Information Technology and Services
25.7%
Financial Services
12.2%
Computer & Network Security
10.1%
Computer Software
8.1%
Banking
4.7%
Other
39.2%
Alternatives
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Alternatives
Proofpoint Core Email Protection
Proofpoint Core Email...
Add Proofpoint Core Email Protection
Cisco Duo
Cisco Duo
Add Cisco Duo
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Paubox
Paubox
Add Paubox
Netwrix Endpoint Protector
Netwrix Endpoint Protector Alternatives
Safetica
Safetica
Add Safetica
Symantec Data Loss Prevention
Symantec Data Loss Prevention
Add Symantec Data Loss Prevention
BetterCloud
BetterCloud
Add BetterCloud
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Discussions
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Discussions
What are the different types of email security?
2 Comments
Shreya B.
SB
Email security is crucial when it comes to protecting our data privacy from cyber attacks and security breaches. We can implement multiple layers of...Read more
Has anyone found a way to completely disable Microsoft Exchange Online Protection so that all email filtering is performed by Avanan alone?
1 Comment
JW
I think you asked this in a different comment/question; but I'll re-iterate, this is typically not a great idea but you could use mail-flow rules.Read more
What is Symantec Email Security Cloud?
1 Comment
JW
Such a broad question. Symantec.cloud is Broadcom's solution to email security 'all in one' with spam and other protections. I have not seen it rank...Read more
Netwrix Endpoint Protector
Netwrix Endpoint Protector Discussions
can we block some domins instead of whitelisting
6 Comments
Official Response from Netwrix Endpoint Protector
Although it was not designed to block domains, Endpoint Protector can block a list of URLs defined by the Administrator. This can be done from the Blacklist...Read more
What is Endpoint DLP?
2 Comments
Ram Ganesh B.
RB
Endpoint DLP is detecting and blocking company specific confidentiality agreements and documentations and source code from company network. Read more
What is Endpoint Protector client?
1 Comment
Surender N.
SN
EPP is a mature end point protector that controls the ports very granularly with ease of central management Read more